protocol
source-address
port
application
attacks
第1题:
A. zone objects
B. policy objects
C. attack objects
D. alert and notify objects
E. network and address objects
第2题:
A. access profile
B. client group
C. client
D. default profile
E. external
第3题:
A. routing-instance
B. zone
C. interface
D. policy
E. rule-set
第4题:
You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()
第5题:
Which three packet interception methods are configurable in WX devices?() (Choose three.)
第6题:
A. mode
B. preshared key
C. external interface
D. security proposals
E. dead peer detection settings
第7题:
Which three options represent IDP policy match conditions?()
第8题:
A.service
B.to-zone
C.attacks
D.port
E.destination-address
第9题:
Which three options represent IDP policy match conditions? ()(Choose three.)
第10题:
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)